OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
Identify the vulnerabilities that make up the OWASP Top 10.
Learn how to prevent common software vulnerabilities.
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
43m 57s • COURSE
OWASP Top 10: #1 Injection and #2 Broken Authentication with Caroline Wong
Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
37m 42s • COURSE
OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) with Caroline Wong
Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
27m 3s • COURSE
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration with Caroline Wong
Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
27m 41s • COURSE
OWASP Top 10: #7 XSS and #8 Insecure Deserialization with Caroline Wong
Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.
26m 31s • COURSE
OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring with Caroline Wong
Take a deep dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
27m 2s • COURSE
You'll learn application security skills with this expert.
Caroline Wong is the vice president of Cobalt.io, a cybersecurity services firm.
She is a strategic leader with strong communications skills, cybersecurity knowledge, and experience delivering global programs. Her close and practical information security knowledge stems from broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga. Caroline has been featured as an Influencer in the Women in IT Security issue of SC Magazine, named as one of the Top 10 Women in Cloud by CloudNOW, and received a Women of Influence Award in the One to Watch category from the Executive Women's Forum. She authored the popular textbook Security Metrics, A Beginner's Guide.